Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Match with definition active attack adversary asset attack computer security cou

ID: 3919707 • Letter: M

Question

Match with definition

active attack   

adversary

asset  

attack   

computer security  

countermeasure

passive attack   

threat  

vulnerability

An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation.

Anything that an owner considers valuable.

An action taken to prevent or minimize the damage of a potential attack.

An unauthorized attempt to modify some aspect of a system’s operation.

A threat carried out.

A real or hypothetical entity that attacks or is a threat to a system.

A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy.

The protection of the integrity, availability, and confidentiality of information system resources.

A potential for violation of security.

a.

An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation.

b.

Anything that an owner considers valuable.

c.

An action taken to prevent or minimize the damage of a potential attack.

d.

An unauthorized attempt to modify some aspect of a system’s operation.

e.

A threat carried out.

f.

A real or hypothetical entity that attacks or is a threat to a system.

g.

A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy.

h.

The protection of the integrity, availability, and confidentiality of information system resources.

i.

A potential for violation of security.

Explanation / Answer

Answer:------------

An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation. ===>>> passive attack

Anything that an owner considers valuable. ===> asset

An action taken to prevent or minimize the damage of a potential attack. ==>> countermeasure

An unauthorized attempt to modify some aspect of a system’s operation. ==> active attack

A threat carried out. ==>> attack

A real or hypothetical entity that attacks or is a threat to a system. ==>>adversary?

A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy. ===> vulnerability

The protection of the integrity, availability, and confidentiality of information system resources. ==>> computer security

A potential for violation of security. ==> threat

a.

An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation. ===>>> passive attack

b.

Anything that an owner considers valuable. ===> asset

c.

An action taken to prevent or minimize the damage of a potential attack. ==>> countermeasure

d.

An unauthorized attempt to modify some aspect of a system’s operation. ==> active attack

e.

A threat carried out. ==>> attack

f.

A real or hypothetical entity that attacks or is a threat to a system. ==>>adversary?

g.

A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy. ===> vulnerability

h.

The protection of the integrity, availability, and confidentiality of information system resources. ==>> computer security

i.

A potential for violation of security. ==> threat